Link Layer Discovery Protocol
|
|
- Angelica Kelly
- 7 years ago
- Views:
Transcription
1 12 Link Layer Discovery Protocol Contents Overview LLDP LLDP Messages Viewing LLDP Neighbor Information Viewing Local LLDP Activity Viewing Real-Time LLDP Messages: debug lldp Commands Viewing LLDP Timers Configuring LLDP Preventing an Interface from Sending Certain LLDP Messages Preventing an Interface from Receiving LLDP Messages Altering LLDP Timers Quick Start
2 Overview Overview Routing protocols allow routers to learn about each other dynamically as a network expands and changes. However, these protocols run over Layer 3 of the Open Systems Interconnection (OSI) model. Devices such as switches, which operate on Layer 2, do not participate. Networks expand all the time; switches are moved, and new ones are added. Devices need to stay up to date on these changes. Link Layer Discovery Protocol (LLDP), which runs over OSI Layer 2, allows locally attached devices in a network, such as switches and routers, to advertise information about themselves to listening devices. (See Figure 12-1.) Because devices continually broadcast and listen for LLDP messages, they can discover when a new device is added or one removed. In this way, they maintain an accurate picture of a dynamic network. Switch LLDP messages Routing protocols LLDP messages Switch Router Router Switch LLDP messages LLDP messages Figure LLDP LLDP LLDP functions over any Data Link Layer network. Nodes transmit information about themselves and listen for information about the devices on each connection. With this information, they compile a picture of the network and of the neighbors that they can reach. Nodes identify neighbors according to the information (such as MAC address and system name) they receive in LLDP messages. LLDP messages also include a network address where a management process such as a Simple Network Management Protocol (SNMP) server can reach the endpoint. 12-2
3 Overview LLDP runs over the Data Link Layer, so devices that use different Network Layer protocols can still identify each other. The ProCurve Secure Router automatically participates in LLDP so that the router can learn about the devices to which it connects and so that it can inform other devices of its presence. Interfaces on the ProCurve Secure Router that run LLDP include: Ethernet interfaces Point-to-Point Protocol (PPP) interfaces High-level Data Link Control (HDLC) interfaces Frame Relay subinterfaces demand interfaces LLDP Messages Figure 12-2 illustrates the format for an LLDP message. Bytes Slow protocol frame LLDP header Type Length Value (e.g. MAC address) Multicast destination address Source address Slow protocol type Sub type Reserved Version Flags Time to live Figure LLDP Message Sent over Ethernet On Ethernet networks, LLDP messages are encapsulated in an 802 Slow Protocol frame, which includes a multicast destination address and the source MAC address of the transmitting interface. The Slow Protocol frame encapsulates the LLDP header and message. Although LLDP is defined as an Ethernet protocol (802.1ab), any Layer 2 protocol can use it. ProCurve Secure Router WAN interfaces, as well as Ethernet interfaces, run LLDP. 12-3
4 The ProCurve Secure Router supports a network control protocol (NCP) called the LLDP Control Protocol (LLDPCP). This protocol allows PPP peers to negotiate the exchange of LLDP messages encapsulated in PPP frames. The router can also exchange LLDP messages over a Frame Relay or an ATM PVC. A Frame Relay frame can use Sub-Network Access Protocol (SNAP) to identify encapsulated Ethernet protocols such as LLDP. ATM subinterfaces that use AAL5 Link Layer Control/ Sub-Network Access Protocol (LLC/SNAP) encapsulation similarly exchange LLDP messages. If the ATM subinterface uses AAL5 MUX encapsulation for PPP frames, then the LLDP messages can be exchanged as described for a PPP connection. The LLDP header includes, in addition to the version field and flags, a time to live (TTL) field. The TTL informs devices how long they should store the information included in the message. The actual information in the message consists of a type length value (TLV) field. Each TLV communicates information about the interface. The information includes: chassis ID MAC address port ID the interface ID (such as ppp 1) network address at which a management process can find the device system name the device s hostname system description for example, the router s model and current Secure Router OS software system capabilities the device type (such as router or bridge) You can prevent interfaces on the ProCurve Secure Router from sending some or all of these messages. The ProCurve Secure Router automatically runs LLDP with settings suitable for a typical network. Before you alter these settings, you should examine the information that the router is actually sending and receiving. You should also understand how LLDP works so that you can capitalize on the information LLDP interfaces collect. 12-4
5 By scanning LLDP information, you can determine which devices the router can reach on the WAN and whether any unauthorized devices have contacted the local router. You can also discover useful information about neighboring devices such as their capabilities and model numbers. You can also find the address for the management agents on connecting devices so that you can configure them remotely (if authorized to do so). Viewing LLDP Neighbor Information Each router interface listens for information from devices on the connection (its neighbor or neighbors). To view information about the router s neighbors, use this enable mode command: Syntax: show lldp neighbors [interface <interface ID>] [detail] A neighbor s LLDP information includes: chassis ID MAC address system name for example, a router s hostname port ID or device port the ID for the neighbor interface that transmitted this message TTL how long, in seconds, this information should be stored platform the device model and, for the ProCurve Secure Router, the Secure Router OS version capabilities all the functions the neighbor can fulfill, which include: router bridge host DOCSIS device (a type of cable modem) WLAN Access Point repeater telephone enabled capabilities the neighbor s current function; the display gives a key for the capabilities (for example, R for router) local port or interface the interface through which the router connects to the neighbor management address an IP address at which the management agent for the neighbor can be reached Use the detail option to see the complete LLDP information for all neighbors. (See Figure 12-3.) For example, enter: 12-5
6 ProCurve# show lldp neighbors detail If you want to limit the display to the neighbor (or, for a multi-access network, neighbors) of a specific interface, use the interface <interface ID> option. For example, enter: ProCurve# show lldp neighbors interface eth 0/1 detail ProCurve# show lldp neighbors detail Chassis ID: 00:12:79:05:25:D4 (MAC Address) System Name: SiteA Neighbor s hostname Device Port: ppp 1 (Locally Assigned) TTL: 120 Platform: ProCurve Secure Router 7203dl Software: Version: 03.01, Date: Fri Aug 12 08:41: Capabilities: Bridge, Router Enabled Capabilities: Router Neighboring device type Local Port: ppp 1 Management Addresses: Address Type: IP version 4, Address: Interface Type: Interface Index, Interface Id: 15 Address from which you can configure the neighbor Figure Viewing Detailed Information about LLDP Neighbors If you enter the show lldp neighbors command without any options, you can also view a summary of the LLDP information. The summary includes only: system name (neighbor s) port ID TTL enabled capabilities platform local port 12-6
7 ProCurve# show lldp neighbors Capability Codes: R - Router, B - Bridge, H - Host, D - DOCSIS Device, W - WLAN Access Point, r - Repeater, T - Telephone System Name Port ID TTL Cap. Platform Local Int SiteA ppp R--- ProCurve Secu ppp 1 Neighbor s connecting interface How long the router should store this information Local connecting interface Figure Viewing LLDP Neighbors Figure 12-4 shows an example of the output of the show lldp neighbors command. As with the detailed display, you can limit the summary to the neighbor or neighbors of a specific interface with the interface <interface ID> option. For example: ProCurve# show lldp neighbors interface ppp 1 Alternatively, you can limit information to a specific neighbor if you know that neighbor s system name: Syntax: show lldp device <system name> A ProCurve Secure Router s system name is its hostname. For example, enter: ProCurve# show lldp device RouterA The show lldp device command automatically produces the detailed display. You can also view actual information about neighbors as this information updates in real time. (See Figure 12-5.) Enter: Syntax: show lldp neighbors realtime 12-7
8 Capability Codes: R - Router, B - Bridge, H - Host, D - DOCSIS Device, W - WLAN Access Point, r - Repeater, T - Telephone System Name Port ID TTL Cap. Platform Local Int Site B eth 0/ R--- ProCurve Secu eth 0/1 Site C ppp R--- ProCurve Secu ppp 1 Steadily counts down Exit - 'Ctrl-C', Freeze - 'f', Resume - 'r' Return to the command line Stop and start the refresh Figure Viewing LLDP Neighbors in Real Time If you want to view the entire LLDP message as it arrives, use the debug lldp commands. (See Viewing Real-Time LLDP Messages: debug lldp Commands on page 12-9.) Viewing Local LLDP Activity To see information about LLDP activity on the router, enter: Syntax: show lldp This command displays how often router interfaces send out LLDP and TTL packets. To view information about the messages the router has received from, as well as transmitted to, its neighbors, enter: Syntax: show lldp interface [<interface ID>] Figure 12-6 shows the information that displays. 12-8
9 ProCurve# show lldp interface eth 0/1 (TX/RX) 240 packets input 0 input errors 0 TLV errors, 0 TLVs Discarded 0 packets discarded 241 packets output 0 neighbor ageouts fr 1.1 (TX/RX) 235 packets input 0 input errors 0 TLV errors, 0 TLVs Discarded 0 packets discarded 235 packets output 0 neighbor ageouts Figure Viewing LLDP Activity on Router Interfaces The show lldp interface command displays the number of LLDP messages all interfaces on the local router have received (input packets) and transmitted (output packets). For the received LLDP, the command line interface (CLI) also displays the number of TLVs that had errors and that have been discarded. When a neighbor does not send an update after the TTL for a previous message has expired, the neighbor ages out. The router assumes that endpoint no longer exists. The number of aged-out neighbors is also displayed. You can also limit the information to a specific interface. For example: ProCurve# show lldp interface eth 0/1 If you want to see a summary of how many neighbors the router has added and deleted, enter: ProCurve# show lldp neighbors statistics Viewing Real-Time LLDP Messages: debug lldp Commands If your network is experiencing unexplained congestion, you can use the debug commands to explore whether a faulty interface is flooding the network with LLDP messages. You can also use the debug lldp commands to determine which interfaces are sending and receiving LLDP messages and what information these messages contain. Caution Debug messages are processor intensive. 12-9
10 You can view the LLDP messages that are arriving on interfaces in real time by entering: Syntax: debug lldp rx [verbose] If an interface seems to be receiving an undue number of messages, you can enter the show lldp neighbors interface <interface ID> command to view information about the device at fault. You should then troubleshoot that device. You can also track the LLDP activity of interfaces on the local router. To monitor the LLDP messages that the router interfaces are transmitting, enter: Syntax: debug lldp tx [verbose] If you want to change how often interfaces send messages, you can raise the minimum transmit interval. (See Altering LLDP Timers on page ) Entering the debug commands without the verbose option simply informs you when a LLDP message is sent or received. If you want to see the actual information in the message, you should add the verbose option. For example: ProCurve# debug lldp tx verbose Figure 12-7 displays an example of the verbose debug of an LLDP message. If you do not want the router to send the information you see displayed, or a specific portion of this information, you should prevent the interface from sending the corresponding type of LLDP message. WAN interfaces, in particular, can compromise a network by transmitting LLDP messages to an untrusted device. See Preventing an Interface from Sending Certain LLDP Messages on page
11 ProCurve# debug lldp tx verbose LLDP: TTL 120 LLDP: System Description "ProCurve Secure Router 7203dl" LLDP: System Name "ProCurve" LLDP: System Description "ProCurve Secure Router 7203dl, Version: 03.01, Date: Fri Aug 12 08:41: " LLDP: System Capabilities: LLDP: Bridge, Router LLDP: Enabled System Capabilities: LLDP: Router LLDP: Management Address: LLDP: Type: "IP version 4" Address: " " LLDP: Interface Type: "Interface Index" Id: 13 LLDP: OID: " " LLDP: Next Update for eth 0/1 in 30 second Figure Debugging LLDP Messages Viewing LLDP Timers You can view the global settings for LLDP timers by entering this enable mode command: Syntax: show lldp The CLI displays: how often LLDP messages are sent how often TTL updates are sent You can change how often LLDP messages are sent by changing the transmit interval and minimum transmit interval. You cannot directly change the TTL. Instead, you must change the TTL multiplier, which determines for how many transmit intervals a message is stored. The TTL is the transmit interval multiplied by the TTL multiplier. See Altering LLDP Timers on page to learn more about altering timers
12 Configuring LLDP Configuring LLDP All active interfaces on the ProCurve Secure Router, except for ATM subinterfaces, automatically send out LLDP messages. (See Table 12-2 on page for the default transmit intervals.) For most networks, the default settings for LLDP are adequate. If you so choose, you can attempt to minimize overhead or to restrict the information the router transmits about itself by: preventing an interface from sending certain LLDP messages preventing an interface from receiving LLDP messages altering the intervals for sending LLDP messages Preventing an Interface from Sending Certain LLDP Messages By default, the ProCurve Secure Router sends LLDP messages over all Ethernet and logical interfaces except ATM subinterfaces, which do not support LLDP. These messages include information about the interface and about the local router: MAC address port ID router model and Secure Router OS software version router s hostname system capabilities network address at which a management process can find the device You should be cautious about the information that you allow WAN interfaces to transmit, particularly on routers that connect to an external network. An unauthorized device can learn a great deal about your system from LLDP messages. To restrict an interface from transmitting LLDP messages, move to the configuration mode context for the interface and enter: Syntax: no lldp send [management-address port-description system-capabilities system-description system-name] 12-12
13 Configuring LLDP Enter no lldp send without any options to prevent the interface from transmitting any messages. You can restrict the interface from sending only certain messages by entering the no form of the lldp send command followed by the specific option. For example, if a WAN interface transmits the management address into an untrusted environment, hackers could attempt to access your router. On the other hand, sending this address to authorized management processes allows network administrators at hub sites to access and manage routers at remote sites. Preventing interfaces from sending messages that you consider less important can minimize the protocol s chattiness. Refer to Table 12-1 for the commands for suppressing or enabling specific types of LLDP messages. Table Suppressing and Enabling LLDP Messages Message Command Syntax IP address for the interface s management agent interface s port ID system capabilities (for example, router or bridge) router model and software version router s hostname [no] lldp send management-address [no] lldp send port-description [no] lldp send system-capabilities [no] lldp send system-description [no] lldp send system-name LLDP messages must include a MAC address (chassis ID). If you do not want the interface to send its MAC address, you must prevent it from transmitting any LLDP messages. Note Even after you prevent an interface from transmitting LLDP messages, it can still listen for them
14 Configuring LLDP Preventing an Interface from Receiving LLDP Messages You can prevent an interface from listening for LLDP messages by moving to its configuration mode context and entering: Syntax: no lldp receive You cannot filter out certain types of information. The interface either receives all LLDP messages or none. Note Preventing an interface from receiving LLDP messages does not stop it from sending them. You prevent an interface from participating in LLDP entirely with this command, entered from the interface configuration mode context: Syntax: no lldp send-and-receive Altering LLDP Timers LLDP can be chatty; you can increase the intervals at which interfaces transmit messages to reduce network congestion. The transmit interval determines how often an interface sends out LLDP messages during normal operations. However, the interface can send messages more often for example, when its status changes. A flapping interface, which toggles between up and down, may send messages out again and again. If LLDP messages are causing too much overhead, you can force the interface to wait a set amount of time before transmitting a new message by raising the minimum transmit interval. An LLDP header includes a TTL field that informs neighboring devices how long they should store the information in the message. The interface sets the TTL field by multiplying the transmit interval by the TTL multiplier. By default, this multiplier is four. That is, information is assumed to be accurate for four LLDP cycles. You configure LLDP intervals for all interfaces from the global configuration mode context. Refer to Table 12-2 for the exact command syntax
15 Quick Start Table LLDP Intervals Interval Meaning Default Range Command Syntax transmit interval minimum transmit interval ttl multiplier reinitialization delay time between sending LLDP messages during normal operations minimum time the interface must wait before sending a new LLDP message number of transmit intervals information should be stored time an interface must wait to send an LLDP message after LLDP is re-enabled 30 seconds 5 to 32,768 seconds lldp transmit-interval <seconds> 2 seconds 1 to 8192 lldp minimumtransmit-interval <seconds> 4 2 to 10 lldp ttl-multiplier <value> 2 seconds 1 to 10 seconds lldp reinitializationdelay <seconds> Quick Start All Ethernet and logical interfaces on the ProCurve Secure Router, except ATM subinterfaces, automatically run LLDP. Typically, you do not need to change any configurations. This section provides the commands you must enter to quickly: disable LLDP on a specific interface disable an interface from sending specific types of information about the router view information about LLDP neighbors Only a minimal explanation is provided. If you need additional information about any of these options, check Contents on page 12-1 to locate the section that contains the explanation you need. 1. You can disable LLDP on a specific interface. Move to its configuration mode context and enter one or more of these commands: a. To disable LLDP entirely, enter: Syntax: no lldp send-and-receive 12-15
16 Quick Start b. You can also prevent the router from sending any LLDP messages, while still allowing it to listen for messages. Syntax: no lldp send c. To only prevent the router from receiving LLDP messages, enter: Syntax: no lldp receive Enter a command without the no option to re-enable the function. 2. You can prohibit an interface from sending some kinds of information about the router, but allow it to send other information. Move to the interface s configuration mode context. Then enter this command followed by the keyword for the type of information that you want to restrict: Syntax: no lldp send [management-address port-description system-capabilities system-description system-name] Table 12-3 explains what information is associated with each keyword. Enter the command without the no option to re-enable the router to send that information. Table Prohibiting an Interface from Sending Certain LLDP Messages Keyword Information management-address port-description system-capabilities system-description system-name IP address at which a management process can reach the router interface s port ID system s capabilities (for example, router or bridge) router model and software version router s hostname 3. To view information about the router s neighbors, move to the global configuration mode context and enter: Syntax: show lldp neighbors [interface <interface ID>] [detail] Use the interface <interface ID> option to view information about only a specific interface s neighbor. The detail option displays all LLDP information. 4. To view information about a specific device, enter: Syntax: show lldp device <system name> 12-16
Chapter 46 Link Layer Discovery Protocol (LLDP)
Chapter 46 Link Layer Discovery Protocol (LLDP) Introduction...46-3 LLDP Overview...46-3 Type Length Values... 46-4 Transmission and Reception... 46-5 Storing LLDP Information... 46-7 Configuring LLDP...46-9
More informationNetwork Discovery Protocol LLDP and LLDP- MED
Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,
More informationNetwork Discovery Protocol LLDP and LLDP- MED
Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,
More informationDomain Name System (DNS) Services
12 Domain Name System (DNS) Services Contents Overview..................................................... 12-3 Host and Domain Names.................................... 12-3 Host Tables...............................................
More informationIP Routing Configuring Static Routes
11 IP Routing Configuring Static Routes Contents Overview..................................................... 11-3 IP Addressing.............................................. 11-3 Networks.................................................
More informationIP Routing Configuring RIP, OSPF, BGP, and PBR
13 IP Routing Configuring RIP, OSPF, BGP, and PBR Contents Overview..................................................... 13-6 Routing Protocols.......................................... 13-6 Dynamic Routing
More informationConfiguring LLDP, LLDP-MED, and Location Service
27 CHAPTER Configuring LLDP, LLDP-MED, and Location Service This chapter describes how to configure the Link Layer Discovery Protocol (LLDP), LLDP Media Endpoint Discovery (LLDP-MED), and Location Service
More informationL2 / L3 Switches. Link Layer Discovery Protocol (LLDP) Configuration Guide
L2 / L3 Switches Link Layer Discovery Protocol (LLDP) Configuration Guide Revision 1.0 The information in this USER S MANUAL has been carefully reviewed and is believed to be accurate. The vendor assumes
More informationContent Filtering. Contents
7 Content Filtering Contents Overview...................................................... 7-2 Risks Posed by Non-Work-Related Use of the Internet............ 7-2 Web Content Filtering on the ProCurve
More informationData Link Protocols. TCP/IP Suite and OSI Reference Model
Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite
More informationUsing Link Layer Discovery Protocol in Multivendor Networks
Using Link Layer Discovery Protocol in Multivendor Networks Link Layer Discovery Protocol (LLDP), standardized by the IEEE as part of 802.1ab, enables standardized discovery of nodes, which in turn facilitates
More informationPacket-over-SONET Interface Commands on the Cisco IOS XR Software
Packet-over-SONET Interface Commands on the Cisco IOS XR Software This module provides command line interface (CLI) commands for configuring Packet-over-SONET/SDH (POS) on the Cisco CRS Router. This module
More informationHow To Configure Voice Vlan On An Ip Phone
1 VLAN (Virtual Local Area Network) is used to logically divide a physical network into several broadcast domains. VLAN membership can be configured through software instead of physically relocating devices
More informationNote: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the
More informationConfiguring T1 and E1 WAN Interfaces
Configuration Guide 5991-3823 December 2005 Configuring T1 and E1 WAN Interfaces This configuration guide explains the processes for configuring your Secure Router Operating System (SROS) T1/E1 product
More informationGuide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
More informationAbstract. Avaya Solution & Interoperability Test Lab
Avaya Solution & Interoperability Test Lab Sample Configuration for using Link Layer Discovery Protocol (LLDP) with Cisco Catalyst 4500 or 3750 Switches for VLAN assignment to Avaya 4600 Series IP Telephones
More informationHigh-Level Data Link Control
High-Level Data Link Control This class of data link layer protocols includes High-level Data Link Control (HDLC), Link Access Procedure Balanced (LAPB) for X.25, Link Access Procedure for D-channel (LAPD)
More informationExample: Configuring VoIP on an EX Series Switch Without Including 802.1X Authentication
Example: Configuring VoIP on an EX Series Switch Without Including 802.1X Authentication Requirements You can configure voice over IP (VoIP) on an EX Series switch to support IP telephones. To configure
More informationCommon Application Guide
April 2009 Common Application Guide WAN Failover Using Network Monitor Brief Overview of Application To increase reliability and minimize downtime, many companies are purchasing more than one means of
More informationWAN Data Link Protocols
WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data
More informationADSL WAN Connections. Contents
7 ADSL WAN Connections Contents ADSL Overview................................................. 7-4 ADSL Technologies.......................................... 7-5 ADSL2 and ADSL2+: Enhancing Transmission
More informationCisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)
Cisco Certified Network Associate Exam Exam Number 200-120 CCNA Associated Certifications CCNA Routing and Switching Operation of IP Data Networks Operation of IP Data Networks Recognize the purpose and
More informationZarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)
QUESTION NO: 8 David, your TestKing trainee, asks you about basic characteristics of switches and hubs for network connectivity. What should you tell him? A. Switches take less time to process frames than
More informationCisco 12 CCNA Certification
Cisco 12 CCNA Certification Application for Board Authorization of Courses District: Chilliwack School District 33 Developed by: John Murtha Date: May7, 2004 School: Sardis Secondary Principal: Bob Patterson
More informationConfiguring Network Address Translation
6 Configuring Network Address Translation Contents NAT Services on the ProCurve Secure Router....................... 6-2 Many-to-One NAT for Outbound Traffic........................ 6-2 Using NAT with
More informationConfiguring DHCP Snooping
CHAPTER 19 This chapter describes how to configure Dynamic Host Configuration Protocol (DHCP) snooping on Catalyst 4500 series switches. It provides guidelines, procedures, and configuration examples.
More informationInterconnecting Cisco Network Devices 1 Course, Class Outline
www.etidaho.com (208) 327-0768 Interconnecting Cisco Network Devices 1 Course, Class Outline 5 Days Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructorled training course
More informationIP Routing Features. Contents
7 IP Routing Features Contents Overview of IP Routing.......................................... 7-3 IP Interfaces................................................ 7-3 IP Tables and Caches........................................
More informationTRILL for Data Center Networks
24.05.13 TRILL for Data Center Networks www.huawei.com enterprise.huawei.com Davis Wu Deputy Director of Switzerland Enterprise Group E-mail: wuhuajun@huawei.com Tel: 0041-798658759 Agenda 1 TRILL Overview
More informationINTRODUCTION TO L2VPNS
INTRODUCTION TO L2VPNS 4 Introduction to Layer 2 and Layer 3 VPN Services CE Layer 3 VPN Link Comprised of IP Traffic Passed Over IP Backbone LEGEND Layer 3 VPN Layer 2 VPN CE CE PE IP Backbone PE CE Layer
More informationAbstract. Avaya Solution & Interoperability Test Lab
Avaya Solution & Interoperability Test Lab Sample Configuration for using Link Layer Discovery Protocol (LLDP) with Cisco Catalyst 4500 or 3750 Switches for VLAN Assignment for Avaya 9600 and 1600 Series
More informationCCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
More informationInternet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004
5 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 1 43 Last lecture Lecture room hopefully all got the message lecture on tuesday and thursday same
More informationObjectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops
ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 Explain the role of redundancy in a converged
More informationHow To Switch In Sonicos Enhanced 5.7.7 (Sonicwall) On A 2400Mmi 2400Mm2 (Solarwall Nametra) (Soulwall 2400Mm1) (Network) (
You can read the recommendations in the user, the technical or the installation for SONICWALL SWITCHING NSA 2400MX IN SONICOS ENHANCED 5.7. You'll find the answers to all your questions on the SONICWALL
More informationTechnote. SmartNode Quality of Service for VoIP on the Internet Access Link
Technote SmartNode Quality of Service for VoIP on the Internet Access Link Applies to the following products SmartNode 1000 Series SmartNode 2000 Series SmartNode 4520 Series Overview Initially designed
More informationIntroduction to Routing and Packet Forwarding. Routing Protocols and Concepts Chapter 1
Introduction to Routing and Packet Forwarding Routing Protocols and Concepts Chapter 1 1 1 Objectives Identify a router as a computer with an OS and hardware designed for the routing process. Demonstrate
More informationHow To Configure A Network Monitor Probe On A Network Wire On A Microsoft Ipv6 (Networking) Device (Netware) On A Pc Or Ipv4 (Network) On An Ipv2 (Netnet) Or Ip
61700600L2-29.3D January 2014 Configuration Guide This configuration guide describes network monitoring and its use on ADTRAN Operating System (AOS) products. This guide contains information about the
More informationNetwork Configuration Example
Network Configuration Example Configuring Link Aggregation Between EX Series Switches and Ruckus Wireless Access Points Modified: 2015-10-01 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California
More informationisco Troubleshooting Input Queue Drops and Output Queue D
isco Troubleshooting Input Queue Drops and Output Queue D Table of Contents Troubleshooting Input Queue Drops and Output Queue Drops..1 Interactive: This document offers customized analysis of your Cisco
More informationHow To Learn Cisco Cisco Ios And Cisco Vlan
Interconnecting Cisco Networking Devices: Accelerated Course CCNAX v2.0; 5 Days, Instructor-led Course Description Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v2.0 is a 60-hour instructor-led
More informationProCurve Secure Router OS Firewall Protecting the Internal, Trusted Network
4 ProCurve Secure Router OS Firewall Protecting the Internal, Trusted Network Contents Overview...................................................... 4-3 Advantages of an Integrated Firewall...........................
More informationMobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP
Mobile IP Bheemarjuna Reddy Tamma IIT Hyderabad Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP IP Refresher Mobile IP Basics 3 parts of Mobile IP: Outline Advertising Care-of Addresses
More informationManagement Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.
Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of
More informationNetVanta Series (with Octal T1/E1 Wide Module)
NET 1 LAN 1 NET 2 LAN 2 WIDE SLOT 1 ACTIVITY TEST NET 1 NET 1 LAN 1 LAN 2 WIDE SLOT 1 NET 2 ACTIVITY TEST LAN 1 NET 2 LAN 2 NET 1 WIDE SLOT 1 ACTIVITY TEST LAN 1 NET 2 LAN 2 WIDE SLOT 1 ACTIVITY TEST NetVanta
More informationDatagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.
CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer
More information! encor en etworks TM
! encor en etworks TM Version A, March 2010 2013 Encore Networks, Inc. All rights reserved. Configuring the BANDIT III s T1 E1 Card for a PCM Voice Network The T1 E1 card fits into the expansion slot on
More informationCCT vs. CCENT Skill Set Comparison
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
More informationConfiguring IP Load Sharing in AOS Quick Configuration Guide
Configuring IP Load Sharing in AOS Quick Configuration Guide ADTRAN Operating System (AOS) includes IP Load Sharing for balancing outbound IP traffic across multiple interfaces. This feature can be used
More informationComputer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks
Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4
More informationOverview of Routing between Virtual LANs
Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information
More informationIPv6 Diagnostic and Troubleshooting
8 IPv6 Diagnostic and Troubleshooting Contents Introduction.................................................. 8-2 ICMP Rate-Limiting........................................... 8-2 Ping for IPv6 (Ping6)..........................................
More informationThe internetworking solution of the Internet. Single networks. The Internet approach to internetworking. Protocol stacks in the Internet
The internetworking solution of the Internet Prof. Malathi Veeraraghavan Elec. & Comp. Engg. Dept/CATT Polytechnic University mv@poly.edu What is the internetworking problem: how to connect different types
More informationGLBP - Gateway Load Balancing Protocol
GLBP - Gateway Load Balancing Protocol Gateway Load Balancing Protocol (GLBP) protects data traffic from a failed router or circuit, like Hot Standby Router Protocol (HSRP) and Virtual Router Redundancy
More informationTroubleshooting an Enterprise Network
Troubleshooting an Enterprise Network Introducing Routing and Switching in the Enterprise Chapter 9 Released under Creative Commons License 3.0 By-Sa Cisco name, logo and materials are Copyright Cisco
More information"Charting the Course...
Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content
More informationInternetworking. Problem: There is more than one network (heterogeneity & scale)
Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication
More informationRohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests
Rohde & Schwarz R&S Encryption Device Functionality & Performance Tests Introduction Following to our test of the Rohde & Schwarz ETH encryption device in April 28 the European Advanced Networking Test
More informationComputer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
More informationRedundancy and load balancing at L3 in Local Area Networks. Fulvio Risso Politecnico di Torino
Redundancy and load balancing at L3 in Local Area Networks Fulvio Risso Politecnico di Torino 1 Problem: the router is a single point of failure H1 H2 H3 VLAN4 H4 VLAN4 Corporate LAN Corporate LAN R1 R2
More informationIntroduction about cisco company and its products (network devices) Tell about cisco offered courses and its salary benefits (ccna ccnp ccie )
CCNA Introduction about cisco company and its products (network devices) Tell about cisco offered courses and its salary benefits (ccna ccnp ccie ) Inform about ccna its basic course of networking Emergence
More information100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.
More informationOSPF Routing Protocol
OSPF Routing Protocol Contents Introduction Network Architecture Campus Design Architecture Building Block Design Server Farm Design Core Block Design WAN Design Architecture Protocol Design Campus Design
More informationFigure 1 - T1/E1 Internet Access
Page 1 of 17 TECH NOTE Configuring T1 and E1 Internet Access in AOS Overview This guide explains how to configure an Adtran Operating System (AOS) router for T1/E1 Internet access. You should use this
More informationChapter 2 - The TCP/IP and OSI Networking Models
Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application
More informationVoice Over IP Per Call Bandwidth Consumption
Over IP Per Call Bandwidth Consumption Interactive: This document offers customized voice bandwidth calculations with the TAC Bandwidth Calculator ( registered customers only) tool. Introduction Before
More informationPrestige 310. Cable/xDSL Modem Sharing Router. User's Guide Supplement
Prestige 310 Cable/xDSL Modem Sharing Router User's Guide Supplement Domain Name Support Enhanced WAN Setup Remote Node Support PPPoE Support Enhanced Unix Syslog Setup Firmware and Configuration Files
More informationConfiguring Demand Routing for Primary ISDN Modules
8 Configuring Demand Routing for Primary ISDN Modules Contents Overview of ISDN Connections................................... 8-4 Elements of an ISDN Connection.............................. 8-5 The Local
More informationRedundancy and load balancing at L3 in Local Area Networks. Fulvio Risso Politecnico di Torino
Redundancy and load balancing at L3 in Local Area Networks Fulvio Risso Politecnico di Torino 1 Default gateway redundancy (1) H1 DG: R1 H2 DG: R1 H3 DG: R1 R1 R2 ISP1 ISP2 Internet 3 Default gateway redundancy
More informationPort Trunking. Contents
12 Port Trunking Contents Overview..................................................... 12-2................................... 12-2 Port Connections and Configuration.......................... 12-3 Link
More informationINTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1)
INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1) COURSE OVERVIEW: Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructor-led training course that teaches learners
More informationIP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
More informationIntegrated Traffic Monitoring
61202880L1-29.1F November 2009 Configuration Guide This configuration guide describes integrated traffic monitoring (ITM) and its use on ADTRAN Operating System (AOS) products. Including an overview of
More informationExhibit n.2: The layers of a hierarchical network
3. Advanced Secure Network Design 3.1 Introduction You already know that routers are probably the most critical equipment piece in today s networking. Without routers, internetwork communication would
More informationUPPER LAYER SWITCHING
52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches
More informationUIP1868P User Interface Guide
UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting
More informationcnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)
Slide 1 Introduction In today s and next week s lecture we will cover two of the most important areas in networking and the Internet: IP and TCP. These cover the network and transport layer of the OSI
More informationHow Much Broadcast and Multicast Traffic Should I Allow in My Network?
PowerConnect Application Note #5 November 2003 How Much Broadcast and Multicast Traffic Should I Allow in My Network? This Application Note relates to the following Dell PowerConnect products: PowerConnect
More informationAdditional Information: A link to the conference website is available at: http://www.curtin.edu.my/cutse2008/index.html
Citation: Veeramani, S. and Gopal, Lenin. 2008. Network monitoring tool, in Curtin University of Technology (ed), Curtin University of Technology Science and Engineering International Conference CUTSE
More informationChapter 4 Customizing Your Network Settings
. Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the Wireless-G Router Model WGR614v9, including LAN, WAN, and routing settings. It
More informationNotes Odom, Chapter 4 Flashcards Set: http://www.flashcardmachine.com/1162711/b41c
EDTECH 552 (SP11) Susan Ferdon Notes Odom, Chapter 4 Flashcards Set: http://www.flashcardmachine.com/1162711/b41c telco Leased Line CSU/DSU Local Telephone Company Owns the cables and has right of way
More informationBandwidth Management in MPLS Networks
School of Electronic Engineering - DCU Broadband Switching and Systems Laboratory 1/17 Bandwidth Management in MPLS Networks Sanda Dragos & Radu Dragos Supervised by Dr. Martin Collier email: dragoss@eeng.dcu.ie
More informationChapter 25 DHCP Snooping
Chapter 25 DHCP Snooping Introduction...25-2 The Binding Database... 25-2 DHCP Filtering... 25-4 DHCP Option 82... 25-4 DHCP Snooping ARP Security... 25-5 Configuration Examples...25-5 Command Reference...25-6
More informationOSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R
OSBRiDGE 5XLi Configuration Manual Firmware 3.10R 1. Initial setup and configuration. OSBRiDGE 5XLi devices are configurable via WWW interface. Each device uses following default settings: IP Address:
More informationESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK
VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was
More informationIP Application Services Commands show vrrp. This command was introduced. If no group is specified, the status for all groups is displayed.
show vrrp show vrrp To display a brief or detailed status of one or all configured Virtual Router Redundancy Protocol (VRRP) groups on the router, use the show vrrp command in privileged EXEC mode. show
More informationLecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)
Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I) By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2015, Networks II Agenda Introduction to networking architecture Historical
More informationSecurity+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network
More informationConfiguring EtherChannels
CHAPTER 12 This chapter describes how to configure EtherChannels on the Cisco 7600 series router Layer 2 or Layer 3 LAN ports. For complete syntax and usage information for the commands used in this chapter,
More information2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above
CCNA1 V3.0 Mod 10 (Ch 8) 1. How many bits are in an IP C. 64 2. What is the maximum value of each octet in an IP A. 28 55 C. 256 3. The network number plays what part in an IP A. It specifies the network
More informationDynamic Host Configuration Protocol (DHCP)
13 Dynamic Host Configuration Protocol (DHCP) Contents Overview..................................................... 13-3 DHCP Request Process...................................... 13-3 The ProCurve Secure
More informationIP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
More informationSSVP SIP School VoIP Professional Certification
SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover
More informationLecture Computer Networks
Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks
More informationBroadband Phone Gateway BPG510 Technical Users Guide
Broadband Phone Gateway BPG510 Technical Users Guide (Firmware version 0.14.1 and later) Revision 1.0 2006, 8x8 Inc. Table of Contents About your Broadband Phone Gateway (BPG510)... 4 Opening the BPG510's
More informationCommunication Systems Internetworking (Bridges & Co)
Communication Systems Internetworking (Bridges & Co) Prof. Dr.-Ing. Lars Wolf TU Braunschweig Institut für Betriebssysteme und Rechnerverbund Mühlenpfordtstraße 23, 38106 Braunschweig, Germany Email: wolf@ibr.cs.tu-bs.de
More informationCourse Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
More informationNetFlow Subinterface Support
NetFlow Subinterface Support Feature History Release Modification 12.2(14)S This feature was introduced. 12.2(15)T This feature was integrated into Cisco IOS Release 12.2 T. This document describes the
More information